FKIE_CVE-2011-1000

Vulnerability from fkie_nvd - Published: 2011-02-19 01:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
jingle-factory.c in Telepathy Gabble 0.11 before 0.11.7, 0.10 before 0.10.5, and 0.8 before 0.8.15 allows remote attackers to sniff audio and video calls via a crafted google:jingleinfo stanza that specifies an alternate server for streamed media.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-February/054324.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-March/054409.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-March/054575.html
secalert@redhat.comhttp://secunia.com/advisories/43316Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/43369Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/43404Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/43485
secalert@redhat.comhttp://secunia.com/advisories/43545
secalert@redhat.comhttp://secunia.com/advisories/44023
secalert@redhat.comhttp://www.debian.org/security/2011/dsa-2169
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/02/17/4Patch
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/02/17/7Patch
secalert@redhat.comhttp://www.securityfocus.com/bid/46440
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1067-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0412Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0428Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0537
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0572
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0901
secalert@redhat.comhttps://bugs.freedesktop.org/show_bug.cgi?id=34048Patch
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/65523
secalert@redhat.comhttps://hermes.opensuse.org/messages/7848248
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054324.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054409.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054575.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43316Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43369Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43404Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43485
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43545
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44023
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2169
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/02/17/4Patch
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/02/17/7Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/46440
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1067-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0412Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0428Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0537
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0572
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0901
af854a3a-2127-422b-91ae-364da2661108https://bugs.freedesktop.org/show_bug.cgi?id=34048Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/65523
af854a3a-2127-422b-91ae-364da2661108https://hermes.opensuse.org/messages/7848248

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7B08E26-8AC8-42B0-87D2-500EE4E6B5F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "40AB1AF4-D061-41E4-AA15-8BC05AAD3D81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDF2FEF-6CF6-447B-9FE2-E4744AB719AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C3DF89-B7A9-4FBD-9E26-957836A08658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E40D638F-EF85-4F15-A937-99F27A3FDE84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7DED28-C74B-4EE1-AABA-C5D4B22B3942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.11.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "03ED1C24-624F-4702-A7D8-33F83266A79D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCC01ED-13F2-4912-A081-868BD9DA2A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E28C647D-E3C4-4BD5-A781-4169650A1F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "22DC153A-79F9-4CFD-A54D-AE2CA76D27B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CDDAD6-08EB-4008-BECD-5D3658AC8FE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4AD9662-762E-484C-A940-40932F973FC8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C60B5C9-EE58-42F4-AC18-10799F030FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4A60D96-D876-4436-B475-F0B0C27C5B6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3164EE83-2DD5-434E-9B5B-671C0533BCC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0718A377-6599-4DF2-A293-EC4F1E9FEC07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED95BED-B0CA-41FF-B519-F63560E2E1F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE426DD3-173C-44CA-B7C6-8E59A73B4C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "17A50E11-9991-46B9-AEAB-33EE84F8C0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB1AF33-EBDC-4647-9147-33BA2CA6B72A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAABBF31-045A-4AE5-8DB1-F3E61BEB5279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A4385F3-AA33-499C-9214-985A1DEC82C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "70C27E85-BB89-4311-9809-FA80BD71B999",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E47A169-0575-49A4-8CA6-972D89C7300E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD4E314B-AB04-4CC2-B568-87936F8F5383",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC06F2FD-C6CC-4D29-8C5F-B3C71978F89F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:freedesktop:telepathy_gabble:0.8.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "20994740-D2E4-417A-8992-76582FB79917",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "jingle-factory.c in Telepathy Gabble 0.11 before 0.11.7, 0.10 before 0.10.5, and 0.8 before 0.8.15 allows remote attackers to sniff audio and video calls via a crafted google:jingleinfo stanza that specifies an alternate server for streamed media."
    },
    {
      "lang": "es",
      "value": "jingle-factory.c en Telepathy Gabble v0.11 antes de v0.11.7, v0.10 antes de v0.10.5, y v0.8 antes de v0.8.15 permite a atacantes remotos rastrear llamadas de audio y v\u00eddeo a trav\u00e9s de una estrofa google:jingleinfo debidamente modificada donde se especifica un servidor alternativo para el contenido multimedia enviado por streaming."
    }
  ],
  "id": "CVE-2011-1000",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-19T01:00:03.587",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054324.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054409.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054575.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43316"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43369"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43404"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/43485"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/43545"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/44023"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2011/dsa-2169"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/02/17/4"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/02/17/7"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/46440"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1067-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0412"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0428"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2011/0537"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2011/0572"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2011/0901"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugs.freedesktop.org/show_bug.cgi?id=34048"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65523"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://hermes.opensuse.org/messages/7848248"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054324.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054409.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054575.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43369"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43404"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/43485"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/43545"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2169"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/02/17/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2011/02/17/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46440"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1067-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0412"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0537"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0572"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0901"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugs.freedesktop.org/show_bug.cgi?id=34048"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65523"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://hermes.opensuse.org/messages/7848248"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…